In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...
This paper presents the case for Information Visualization (IV) to be a central, integrated component of study in Information Science. We summarize the current state of IV within ...
Marilyn Ostergren, Jeff Hemsley, Miranda Belarde-L...
In this paper we describe the material of a construction kit designed to allow children to build their own handheld and wearable devices to meet their interests and passions. Child...
Bakhtiar Mikhak, Fred Martin, Mitchel Resnick, Rob...
As the demand for higher performance computers for the processing of remote sensing science algorithms increases, the need to investigate new computing paradigms is justified. Fie...
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...